A survey on top security threats in cloud computing

Abstract

Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

Authors and Affiliations

Muhammad Kazim, Shao Zhu

Keywords

Related Articles

Nonlinear Model Predictive Control for pH Neutralization Process based on SOMA Algorithm

In this work, the pH neutralization process is described by a neural network Wiener (NNW) model. A nonlinear Model Predictive Control (NMPC) is established for the considered process. The main difficulty that can be enco...

An Item-based Multi-Criteria Collaborative Filtering Algorithm for Personalized Recommender Systems

Recommender Systems are used to mitigate the information overload problem in different domains by providing personalized recommendations for particular users based on their implicit and explicit preferences. However, Ite...

An Internet-based Student Admission Screening System utilizing Data Mining

This study aimed to propose an internet-based student admission screening system utilizing data mining in order for officers to reduce time to evaluate applicants as well as for the faculty to use less human resources on...

Towards Usability Guidelines for the Design of Effective Arabic Websites

The Arabic websites constitute 1% of the web content with more than 225 million viewers and 41% Internet penetration. However, there is a lack of design guidelines related to the selection and use of appropriate font typ...

Estimating True Demand in Airline’s Revenue Management Systems using Observed Sales

Forecasting accuracy is very important in revenue management. Improved forecast accuracy, improves the decision made about inventory and this lead to a greater revenue. In the airline’s revenue management systems, the in...

Download PDF file
  • EP ID EP142748
  • DOI 10.14569/IJACSA.2015.060316
  • Views 89
  • Downloads 0

How To Cite

Muhammad Kazim, Shao Zhu (2015). A survey on top security threats in cloud computing. International Journal of Advanced Computer Science & Applications, 6(3), 109-113. https://europub.co.uk/articles/-A-142748